Cloud 101CircleEventsBlog
Help shape the future of cloud security! Take our quick survey on SaaS Security and AI.

All Articles

All Articles
Basic Cyber Hygiene Prevents 98% of Attacks

Blog Published: 09/27/2023

Originally published by Microsoft. In today’s digital age, companies are increasingly reliant on technology and online systems to conduct their business. As a result, meeting the minimum standards for cyber hygiene is essential for protecting against cyber threats, minimizing risk, and ensuring t...

Putting Zero Trust Architecture into Financial Institutions

Blog Published: 09/27/2023

Written by Arun Dhanaraj. IntroductionTraditional security methods are no longer enough to protect the valuable assets of financial institutions in a time when online threats are getting more sophisticated and attack routes are changing. In espionage, the idea of Zero Trust Architecture (ZTA) has...

OpenCRE.org - The How and The Why of Security Best Practices

Blog Published: 09/27/2023

Written by Rob van der Veer, Software Improvement Group; Spyros Gasteratos, OWASP; and Lefteris Skoutaris, CSA. In cybersecurity it is important to understand all aspects of best practices and controls: what risks and threats are they solving, what regulations and standards are prescribing them, ...

Long Standing Foundations of Zero Trust

Blog Published: 09/26/2023

Looking under the covers of Zero Trust, it quickly becomes apparent some long-time security principles are at work. These principles are applied differently than we historically did because of changes in the way we now work and live, combined with advances in technology and threats. When viewed a...

Top 3 Cloud Migration Security Risks

Blog Published: 09/26/2023

Originally published by Synack. Written by Charlie Waterhouse and Justine Desmond.The benefits of cloud computing are hard to ignore – the speed, flexibility and cost savings make it a worthwhile investment for many enterprises. What’s written in fine print is that while cloud providers do mainta...

Addressing Insider Threats Through Enhanced Data Protection

Blog Published: 09/26/2023

Originally published by CXO REvolutionaries. Written by Erik Hart, Global CISO, Cushman & Wakefield. The words “insider threat” have been known to make a CISO shudder. Few attack vectors can more quickly undermine a well-construed line of defenses than a credentialed user who – intentionally ...

Cloud Security Detection Doesn’t Reduce Risk. Here Are Six Remediation Steps That Do.

Blog Published: 09/26/2023

Originally published by Dazz. Written by Eshel Yaron, Software Engineer, Dazz. As organizations migrate their software development lifecycle from on-premises to the cloud, our tools have changed to deal with fast-paced CI/CD pipelines. Similarly, the tools we use to detect application vulnerabili...

Why Healthcare Organizations Are Slower to Adopt Cloud Services

Blog Published: 09/25/2023

Originally published by Skyhigh Security. Written by Rodman Ramezanian, Global Cloud Threat Lead, Skyhigh Security. Security and compliance concerns dominateConsidering the type of sensitive data held by healthcare organizations, it’s not surprising that the sector has been more cautious about ad...

Frequently Asked Questions Answered—ISO 27001 Certifications

Blog Published: 09/25/2023

Originally published by BARR Advisory. As one of the most thorough cybersecurity assessments an organization can go through, achieving ISO certification might initially seem daunting. At our recent ISO Open House, Director of Attest Services Angela Redmond and Manager of Attest Services Marc Gold...

Safeguarding the Healthcare Industry: Effective Measures to Prevent Ransomware Attacks

Blog Published: 09/25/2023

Originally published by CyberGuard Compliance. Written by Daniel Porter. The healthcare industry, entrusted with safeguarding sensitive patient information, faces a growing threat from malicious cyberattacks, particularly ransomware. These attacks not only compromise patient data security but als...

NIST CSF vs. Other Cybersecurity Frameworks

Blog Published: 09/22/2023

Originally published by Schellman. With the new SEC Cybersecurity Disclosure Rule requiring both the reporting of material cybersecurity events and the annual disclosure of cybersecurity programs for public companies, those affected are taking a closer look at cybersecurity frameworks that—while ...

How the CISO Drives Value Across the Enterprise

Blog Published: 09/22/2023

Originally published by Coalfire. Written by Michael Eisenberg, Vice President, Strategy, Privacy, Risk, Coalfire. Key takeaways:CISOs must evaluate and present the Return On Security Investment (ROSI) in terms of security spend and business outcomes.To achieve positive ROI, CISOs should focus re...

What is Cloud Repatriation?

Blog Published: 09/22/2023

Originally published by Sangfor Technologies. Written by Nicholas Tay Chee Seng, CTO, Sangfor Cloud.The Cloud Repatriation Trend in 2023Browse the pages of most IT tech news websites and chances are you will come across stories of enterprise organizations migrating en masse to the public cloud as...

Cyberthreats Increasingly Target the World’s Biggest Event Stages

Blog Published: 09/21/2023

Originally published by Microsoft. Threat actors go where the targets are, capitalizing on opportunities to launch targeted or widespread, opportunistic attacks. This extends into high profile sporting events, especially those in increasingly connected environments, introducing cyber risk for org...

Cloud Security Alliance Awards 2023 Philippe Courtot Leadership Award to Schellman CEO Avani Desai

Press Release Published: 09/21/2023

Volunteers are also honored for outstanding efforts in advancing cloud security, cybersecurity worldwide with the Juanita Koilpillai and Chapter of Excellence Awards BELLEVUE, WA – SECtember – Sept. 21, 2023 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defini...

2023 Global Cloud Threat Report: Cloud Attacks are Lightning Fast

Blog Published: 09/21/2023

Originally published by Sysdig. Written by Michael Clark. The second annual threat report from the Sysdig Threat Research Team (Sysdig TRT) is packed with their findings and analysis of some of the hottest and most important cybersecurity topics this year. Threat actors are really embracing the c...

Ready, Set, Respond: Ensuring Compliance with the SEC Reporting Regulations

Blog Published: 09/21/2023

Originally published by Mitiga. Written by Ariel Parnes. The Securities and Exchange Commission (SEC) of the United States has adopted new regulations that require public companies to disclose material cybersecurity incidents within four days. To the positive, this initiative seeks to increase tr...

Standards for Quantum-Safe Security and the Financial Industry

Blog Published: 09/20/2023

Written by Denis Mandich, Quantum-Safe Security Working Group Member and CTO for Qrypt. The financial community relies on several standards organizations to provide consensus guidance on protecting data and information exchanges, primarily for payments and securities transactions. These standards...

EU Cloud Code of Conduct Collaborates with Cloud Security Alliance to Further Harmonize GDPR Compliance

Press Release Published: 09/20/2023

New collaboration to further harmonize GDPR complianceBrussels and Seattle – Sept. 20, 2023 – Starting in November 2023 and through a specific framework, the Cloud Security Alliance (CSA) community will have access to an approved and European Data Protection Board (EDPB)-endorsed GDPR compliance ...

3 Ways Cybercriminals are Targeting Your Email

Blog Published: 09/20/2023

Original published by Abnormal Security. Written by Mike Britton. It wasn't long ago that the world was much simpler when it came to protecting our employees and their email use. We all had a data center. Most of our employees spent their days working in an office. While SaaS has been around for ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.